Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 13:11

General

  • Target

    JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe

  • Size

    717KB

  • MD5

    04c32827e32ed5f337ca2b8a333650eb

  • SHA1

    18323d36d437332243510739b1de83aea4bbf376

  • SHA256

    cd404cafd47781916d9f87642a3480ae62505fd176d0793ec01dd00431e00e1e

  • SHA512

    9c600896c940d6e25677cd4c4e0f0764e990dc5ba37db0f6609fc3a98ea05e2a18c2bfae877267202448814ef0ab4b19fcf32e1a9a2be8025fe45e0975154e1b

  • SSDEEP

    12288:sc//////MH00msiGLOV4gf0PegUbPcRLI26m0P5xYSNtcLsVHPjhs:sc//////MHVKb/fwegUbczQ/YSNtcL8i

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04c32827e32ed5f337ca2b8a333650eb.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1ba1ff1f32ca037af9e6d1927bfe874

    SHA1

    34d4b7b135850957959fee510bfdbdb42914aa07

    SHA256

    4bef6977f89a7234a42894846fa9863ce18395654332ee509195b4d8fdf2050a

    SHA512

    87e82dab84336124308e4b6678d8a4bf601f61efa998a9eabffc3c3517aec403239e402041e264c6d1b40a221598321fbaac0aae1a94616a85edeafbd8cf541c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c2ce8a0d42275a130419f9d569e43a1

    SHA1

    342363f3c00ffa7b9bdd994fd929b3503bad1210

    SHA256

    bd1dd3e4f6b93327da828d0c388acab845d2c1fc4b8ace466ddefc87ecb36f53

    SHA512

    b784b8a13d58091e776bff3bab27c78e5d2fe9877e90cff83cb707b7e27f5dc26970e2070ba213a6be4f738144c2ed23134b4c96c2ddfc92f2aaae398d653026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5dd243226e8c2cb789e6bd09824843f

    SHA1

    d4f7db12713cba17d8412b400c2e9e1fc6a90b53

    SHA256

    7a18c0adf973d49c40f21d63b5b2cf3a2ed5cf31b930322ef2abfc3631d4b054

    SHA512

    dc9b541197aa3faf56be8412f0b94a1c75a2f1c929e8056cd94c6be3eeda2abdd074c85adaaabd9f22abff2f05a97e4ea416a4a12b5f9b377a7f66ef92f05fed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d497b63860c1af9865a709b03316abc0

    SHA1

    88e14c153b9bcf68e77f33e6927127c04f87f422

    SHA256

    32ac1e41aa79afdec3a1c039f271dfd81472fc287f30336f221a925c7fa6d3ae

    SHA512

    f1998aeb33f00ba7e0df4e3779aaef167c2f302c27a4a1796699a3906ab939e5ecd6470aa12da1009c951db12f3bb747f87751cfc1bf8f0b944ed4a2b2370646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a36d2646737ee8e160caead53fbfcf6

    SHA1

    f3b82b6dc0ae128fad57205348c2e5aeff7ec0d3

    SHA256

    bac9ff0105cd3339ff854a1492e5d79736fb814d6d8c809983fe56b32f96a833

    SHA512

    27b706cd68fafd3386db2195739c57aea59bcb6bf4f763586b0ea91565a856da9bfa4cdf4859fef7eeaec6a12fcc607747506018843f300f9e15121920b75450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebde9a7f332d6154959231301bb38523

    SHA1

    ea91953184a39ceb01cd13fb07e99aa1249817fd

    SHA256

    e99fbbc0898181a97721735764790e32286138d6fce74db08aa7564f95127ab7

    SHA512

    41170fffc6c9a98ffa683266a0a12c3268fddda9f333cb7dd0521fb3be8a96950379c7ad09dfe46feae0e2bc738f2c6921073c533b90eb03d666320cf1ac6a43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    136a64eddcf297b6984f14bed08f9738

    SHA1

    2c7161b805266306e8d19f27917a5377cb4644dd

    SHA256

    62c1648fdbc00510a198cb4d3a1ab607ab0ab4e745bc8764f13b021415300471

    SHA512

    a2fd7d88cc1b1e02aecd5730a84b0d18ec480dedb224263680b0a831cc05092b1ba3833f47c88b6e30033e22b0fa8829e06141d72dc9f78ca3fbd986a78c8584

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d2ec192dc15d686b76d6b26427215d

    SHA1

    e9de5657189c3ca1c4f6b12627ab54005bb308c3

    SHA256

    ee7e988047832e96179faf892eb617e8ebed4f5c87314dbda8700304b009d33b

    SHA512

    bcff34f696a627a70ea216a71644ee400930e8506291ff49ff2c59ccebd0265b61c808ebffc8b03d258eec5676e6b87079dc0d3dd7e1e4a3b198f290594c725d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    445422c38998e8bd653688c11281cb22

    SHA1

    5e97739741d9cf20114f51cb5c6744b52caaed97

    SHA256

    0c3dc505e1788c2eb5e30cfa2c9896d968c6884e8e6a968d3f29d4f01fb2e2e7

    SHA512

    bed064fd5876da457416a40f211e783e1545952e2a0fa02e4b15cfd71c6add8dfe709cbc3bfa7024d47b5f0a2de9de8b93771fec012a581e08f1459a302ed480

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af1a02cf6e881455990a1be7376eabea

    SHA1

    314dd90871f2b1551c69079aafc16eb602681337

    SHA256

    e7e575886376fbd410b67caff5b1f96f12fb194d5b6fbe4134dfc1b2b71e59a7

    SHA512

    7903380b7f351756aa8a48dd0a24975144193c72514f279eb70444e75b4cd984a9c8364c2ce661b1f419469b9c60e19226ff951e64ba5f9f57ea1e1e2a2b9ec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4398d0c24b7201525e44e187c6f3b1a1

    SHA1

    778e4a280c5344079de76a5ed067597003114a11

    SHA256

    8c8c6478f4da5824e97c0decb6f0d170c6674e1b3bfc0fe4b16384aeb6c07e6b

    SHA512

    ae8f316500bd22c66c9c781c6e34c7ae1899570928cc8c097bdb8f783b5a5860c293be6141185d1306b0100c4dda74ab240d2268ed481c01385c4af1cefc1020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    519d1d67189bae3fb313b6de5b1b843f

    SHA1

    2e0b0f7033b4161b9eb710612ae7763804bf994e

    SHA256

    69d8d0984d3b1e55a212c2290c67ba79fa3ecfd664d49a5176792ed01f7a7d2a

    SHA512

    abdcd26a1c46d4cc1324bc5a54c217d8f247d285aea03470ee1c839a9444f1564102bb3161334db33302e5ef0171e43b736304b1dffba3f96d297ec320c11a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b0fb04c1cbbc790d8c1db363b324b0e

    SHA1

    2f1ec2b7d04ee7a52bd8d9de037b2317c8ff8551

    SHA256

    9423b9b0b243bbd4802b7a9297984d3cd9275eccb2f83e10b32df9c5dbd88e91

    SHA512

    60408909fdc4488b31d5ad907c7b855ad6eda2842c5d7f2166d99450b631b569a1c0745eb119ecf01304d119b19b8fbabf4322dcda97625382a01c4b8d05c9ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    775c7e3090bffa9b5e897fe210663d8a

    SHA1

    3753c7844ae4f3341f6c3d210b0bce62e1fe6348

    SHA256

    35a99109d522221844970d200806756084ddcf4a7c82d861725b362215e41324

    SHA512

    0cca1335e8cc8984dde20ef24d8b3dbd0024df43247d857927dd7cfcd2571df0c5d46290159b25ae741cbaf2ee04dc621de7204d97f9a8c94e01e5a7d2bdef60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e952b849effcf1ac89a20573655357bf

    SHA1

    229e0932f15a35a53fe46afd5d6e2f715bb4ab1b

    SHA256

    b995629670ec4b0e16069308d07dea2368df67879e1117035b3807d151d40dc9

    SHA512

    a0a1dbb3e4ee1ae51c0be7abc69fbbb9a9b4bf67cbb6f96cc299a8f52606d692fb63bca62509fee636e35ad9d3247b52d06c428af3f32c88108ce29d9600e304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31faf50932ab5a9cd142349f468c3890

    SHA1

    6323e1ed53f28da45e60e2278d0ed7a16090ef9a

    SHA256

    5b396c89e42f59e77e6f5f23bf4f1a3e208d4770841b79e532fbf3448c3fb354

    SHA512

    cf02b15ab35d201101b83607707e259af98bac6c67ba430d24cff0832c2bafe3f1f0f1939335b65cd546803dc397982b75253568f9ef660586e89db3b2918098

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43b08020decc498269b7208226741938

    SHA1

    25d1f53edab08a5cbab07894a1f33344a7ac0007

    SHA256

    8d9eef4a89d0f7b519e1b1161b8b87a47c2bd4838547edf63b154034604bd21e

    SHA512

    21517598ef0d3464a23f3ff044476aef3f8440f431910a518bea208d845b13e26a251d908a59d75dc8d24da8561fa6827fe312bd63727b8f04d3bf3b33e25cf7

  • C:\Users\Admin\AppData\Local\Temp\CabF7F9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF878.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1340-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-12-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-15-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1340-2-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-4-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1340-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2176-5-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2816-11-0x00000000001D0000-0x000000000028A000-memory.dmp

    Filesize

    744KB